![DonaFraser](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/DonaFraser-683x683.jpg)
![K Royal K Royal](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/K-Royal-1.jpeg)
![Bob Sullivan Bob Sullivan](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Bob-Sullivan.jpeg)
Sessions and workshops moderated: Data Breach Fallout: The Legal and Ethical Considerations Concerning Stolen Data (2015)
![Mark Schrieber Mark Schrieber](https://www.privacysecurityacademy.com/wp-content/uploads/2019/07/Mark-Schrieber-412x412-1.jpg)
Sessions and workshops moderated: What We Can Learn from DefCon – Hacking Comes in All Varieties (2015)
![Lourdes Turrecha Lourdes Turrecha](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Lourdes-Turrecha-683x683.jpeg)
Sessions and workshops moderated: Breaking Glass Ceilings: Executive Women in Privacy and Security (2015)
![debra bromson 1](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/debra-bromson-1.jpg)
![Randy-Sabett](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Randy-Sabett-2.jpg)
Sessions and workshops moderated: Information Privacy Law: Foundations (2015)
![Ann Waldo Ann Waldo](https://www.privacysecurityacademy.com/wp-content/uploads/2020/01/Ann-Waldo.jpg)
Sessions and workshops moderated: The Future of Research: What HIPAA Changes Are Being Proposed by Congress and HHS? What Should Be Changed? (2015)
![Daniel Barth Jones Daniel Barth Jones](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/Daniel-Barth-Jones.jpg)
![Kim Tony press 400×400 400×400 Kim Tony press 400x400 400x400](https://www.privacysecurityacademy.com/wp-content/uploads/2018/12/Kim_Tony_press_400x400-400x400.jpg)